Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:47
Static task
static1
Behavioral task
behavioral1
Sample
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe
Resource
win10v2004-20220901-en
General
-
Target
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe
-
Size
377KB
-
MD5
97de3e390b56a250cd6edc7ad6801a68
-
SHA1
3cef223df5d5d1059002ed26eee14b7852a39be6
-
SHA256
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41
-
SHA512
f45e0b7665b184c0b8a3a9a7b518bfc4129ba8a28619857462d53141c6eebb73faaae86f64d28fe5e2af25ef3ea7b7e33e2ffd1b4c835f62fce0e8da1cf44733
-
SSDEEP
6144:maK7YuRhCWXuFAjPv5Ab2IpFyEiul8vWjllQV5q031poyk9GNqcq:maKd0WKKvhICEidvalneo9Qq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
tyipd.exepid process 364 tyipd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tyipd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run tyipd.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tyipd = "C:\\Users\\Admin\\AppData\\Roaming\\Nyofb\\tyipd.exe" tyipd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exedescription pid process target process PID 4936 set thread context of 724 4936 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
tyipd.exepid process 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe 364 tyipd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exetyipd.exedescription pid process target process PID 4936 wrote to memory of 364 4936 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe tyipd.exe PID 4936 wrote to memory of 364 4936 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe tyipd.exe PID 4936 wrote to memory of 364 4936 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe tyipd.exe PID 364 wrote to memory of 2308 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2308 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2308 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2308 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2308 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2316 364 tyipd.exe sihost.exe PID 364 wrote to memory of 2316 364 tyipd.exe sihost.exe PID 364 wrote to memory of 2316 364 tyipd.exe sihost.exe PID 364 wrote to memory of 2316 364 tyipd.exe sihost.exe PID 364 wrote to memory of 2316 364 tyipd.exe sihost.exe PID 364 wrote to memory of 2388 364 tyipd.exe taskhostw.exe PID 364 wrote to memory of 2388 364 tyipd.exe taskhostw.exe PID 364 wrote to memory of 2388 364 tyipd.exe taskhostw.exe PID 364 wrote to memory of 2388 364 tyipd.exe taskhostw.exe PID 364 wrote to memory of 2388 364 tyipd.exe taskhostw.exe PID 364 wrote to memory of 3048 364 tyipd.exe Explorer.EXE PID 364 wrote to memory of 3048 364 tyipd.exe Explorer.EXE PID 364 wrote to memory of 3048 364 tyipd.exe Explorer.EXE PID 364 wrote to memory of 3048 364 tyipd.exe Explorer.EXE PID 364 wrote to memory of 3048 364 tyipd.exe Explorer.EXE PID 364 wrote to memory of 2584 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2584 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2584 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2584 364 tyipd.exe svchost.exe PID 364 wrote to memory of 2584 364 tyipd.exe svchost.exe PID 364 wrote to memory of 3208 364 tyipd.exe DllHost.exe PID 364 wrote to memory of 3208 364 tyipd.exe DllHost.exe PID 364 wrote to memory of 3208 364 tyipd.exe DllHost.exe PID 364 wrote to memory of 3208 364 tyipd.exe DllHost.exe PID 364 wrote to memory of 3208 364 tyipd.exe DllHost.exe PID 364 wrote to memory of 3296 364 tyipd.exe StartMenuExperienceHost.exe PID 364 wrote to memory of 3296 364 tyipd.exe StartMenuExperienceHost.exe PID 364 wrote to memory of 3296 364 tyipd.exe StartMenuExperienceHost.exe PID 364 wrote to memory of 3296 364 tyipd.exe StartMenuExperienceHost.exe PID 364 wrote to memory of 3296 364 tyipd.exe StartMenuExperienceHost.exe PID 364 wrote to memory of 3364 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3364 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3364 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3364 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3364 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3472 364 tyipd.exe SearchApp.exe PID 364 wrote to memory of 3472 364 tyipd.exe SearchApp.exe PID 364 wrote to memory of 3472 364 tyipd.exe SearchApp.exe PID 364 wrote to memory of 3472 364 tyipd.exe SearchApp.exe PID 364 wrote to memory of 3472 364 tyipd.exe SearchApp.exe PID 364 wrote to memory of 3716 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3716 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3716 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3716 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 3716 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 4708 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 4708 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 4708 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 4708 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 4708 364 tyipd.exe RuntimeBroker.exe PID 364 wrote to memory of 4936 364 tyipd.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 364 wrote to memory of 4936 364 tyipd.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 364 wrote to memory of 4936 364 tyipd.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 364 wrote to memory of 4936 364 tyipd.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 364 wrote to memory of 4936 364 tyipd.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 4936 wrote to memory of 724 4936 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3364
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3296
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2584
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3716
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3472
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe"C:\Users\Admin\AppData\Local\Temp\21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Roaming\Nyofb\tyipd.exe"C:\Users\Admin\AppData\Roaming\Nyofb\tyipd.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HUS5398.bat"3⤵PID:724
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2388
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD569d48b5783cb2fddb1c5e3daf30d613e
SHA169d2001ba2a796bdcd492591314774140adef445
SHA256ef18142ec66c1a09921644a30c05eddaad614469f7dc106570581d98e2c75d68
SHA51203a2ccbb605284755101b30e5cfabdf67614e0d5a8ffa3cf46a4cbfff5cd73bb54eec4aaa62a09f3a967ba1aec39c53582be3ce30ac8d89398974a71b86bfc74
-
Filesize
377KB
MD52e06eb823886da6a071c51db94d517fb
SHA149bc3da6b0db251380d89bb86ab80158dceb39d7
SHA2564d760d15a9feacdf7bf8a5ec0a8c65ad81908e6df5fb7b7f8e58c7d4f1494907
SHA5123513777d71f5bee9aae26e000c40fcaf7160b2eb0506fc3a20b7246ed71449eb565728392276c4596ea961f709ab8e53d90211d0b379f6351d41a4dc5ba3c8c4
-
Filesize
377KB
MD52e06eb823886da6a071c51db94d517fb
SHA149bc3da6b0db251380d89bb86ab80158dceb39d7
SHA2564d760d15a9feacdf7bf8a5ec0a8c65ad81908e6df5fb7b7f8e58c7d4f1494907
SHA5123513777d71f5bee9aae26e000c40fcaf7160b2eb0506fc3a20b7246ed71449eb565728392276c4596ea961f709ab8e53d90211d0b379f6351d41a4dc5ba3c8c4